This security suite includes a virtual keyboard to defeats keylogging viruses, passwords of up to 1024 characters, file shredding and Internet cache file shredding. Topics: Onux - PC Security, Internet, Security, Security applications, Onux - PC Security
This program helps you identify insecure Web sites and move them to the restricted zone with just one click. The integrated configuration assistant helps you securing your surfing environment. While surfing the Web you confirm any ActiveX usage. You can identify advertising providers and move them into the restricted zone. Topics: Security Zone Manager, Internet, Security, Security applications, Security Zone Manager
This program encrypts your files with more than 20 algorithms like Twofish, Cast128, Blowfish and Shaphire II. A special algorithm is used to securely erase data. Topics: Computer Security, System and utilities, Security, User management, Computer Security
This tool hides and locks files and folders, or restrict access by making them read-only. It can also lock disks. The protected objects can't be deleted, modified, renamed, moved or used. Drag-and-drop operation is fully supported. Topics: Folder Security Personal, Internet, Security, Security applications, Secure Folder
This program protects your information and identity in real time. It notifies you immediately if a key logger, spyware item or browser helper object is loading on your system. Topics: AppAlarm, Internet, Security, Security applications, AppAlarm
This program obscures a Windows Web server removing or modifying unnecessary HTTP and SMTP response data, the most obvious signs that you are running IIS. Topics: ServerMask, Internet, Security, Security applications, ServerMask
This is the add-on for Microsoft IIS which password protects contents without using system user accounts. It is compatible with htaccess on Apache. IISPassword can be integrated with existing solutions for automatic administration based on scripts or applications. Topics: IISPassword, Internet, Security, Security applications, IISPassword
This program offers Explorer control, file lock, folder lock, system lock, Internet lock, shortcut and program Lock, restricted system, Window lock, intruder detection with alarm, flexible and complete password protection and drag-and-drop support. Topics: PC Security, Internet, Security, System locking, pc, security, pcsecurity, pc security
This program prevents current and future security threats on the Windows operating system, and within Internet Explorer. It is automatically updated whenever new threats are detected. It closes off the pathways that worms and viruses use to penetrate your PC without interfering with firewalls or other antivirus software. Topics: Qwik-Fix, Internet, Security, Security applications, Qwik-Fix
Provides a new layer of protection against unknown viral attacks. Once installed, this layer is activated automatically, catching newly created viruses. Using Parador will allow implementing a proactive security solution that will complement current technologies that rely on signature updates. The Parador solution does not use signature files that can be outdated daily by the release of new viruses or attacks against new vulnerabilities found in a platform. Instead, it protects your data by... Topics: Parador File protection, Internet, Security, Security applications, Parador File protection
This program lets you secure the following: Active Desktop, Control Panel, Display, Desktop and Explorer, and Login and Authentication. It contains over 100 security settings. Topics: Secure XP, Internet, Security, Security applications, Secure XP
This program detects and protects your system from intrusions under NT 4, Windows 2000 and Windows XP. It sounds notifications with WAV files or direct speech, and it can e-mail your security administrator or another address. Topics: Office Keeper, Internet, Security, Security applications, Office Keeper
This tool combines a free set of security services with simplified access to McAfee.coms managed security products. It includes a security index and real-time external security alert system to assess, inform, and warn you about your PC's vulnerabilities. Each tool quickly evaluates your exposure to security and Internet-based threats and provides recommendations to quickly and securely protect your PC. Topics: McAfee.com SecurityCenter, Internet, Security, Security applications, mcafee com securitycenter
This is a security utility that scans your auto-complete fields for credit card numbers and removes them preventing your credit card data from being stolen from your computer. Topics: Secure Credit Card, Internet, Security, Security applications, Secure Credit Card
This application protects your network and seamlessly fits into your current system. McAfee has built this firewall with total protection in mind. It includes support for Windows Millennium and recognition of virtual adapters such as PPTP and WinPoet. Topics: McAfee Firewall, Internet, Security, Firewalls, Firewalls, Mcafee, firewalls, security
This network security management platform receives events as inputs from many different sources and protocols, processes them through complex correlation filters, and forwards them to outbound destinations like consoles. It enables OEMs, VARs and end-users to develop event correlation solutions, and sell them as separate value-added products. The program provides real-time event correlation, event aggregation and archiving, protocol conversion and transaction validation, forensic data analysis,... Topics: Event Correlation Server, Internet, Security, Security applications, Event Correlation Server
This application security testing tool gives developers an environment for testing non-HTTP client and server applications. When started, ITR operates as a simple TCP tunnel, listening on a specific port and forwarding all traffic to the remote host and port. By configuring the client to treat the ITR as its server, all traffic between a client and a server can be tunneled and logged. The program can intercept and edit the traffic passing through it. When invoking intercept mode, the ITR stops... Topics: Interactive TCP Relay, Internet, Security, Security applications, Interactive TCP Relay
This is a desktop security program that protects your computer from Windows startup. It does not allow intruders to access anything without a username and password. There is system tray support, password recovery and locking screen saver. Topics: BootLocker, Internet, Security, System locking, bootlocker, canada, us, security, encryption
This is a mini-sized personal firewall which can protect you against hacker intrusions. GoldTach works in three ways: TCP/IP packet filtration, process communication control and e-mail protection. It defines three security control levels: normal, strict and custom . When GoldTach is in Lock Internet mode, processes cannot access the Internet accept those that you permit. The process management tool lets you know the details for processes, such as parent process ID, open handles, owned thread or... Topics: GoldTach, Internet, Security, Firewalls, GoldTach
This integrated personal firewall and VPN inter-operates with most other third-party VPN gateways. It offers security and remote access to small business and personal users. It can be used as a client or as a gateway. Topics: Katana, Internet, Security, Firewalls, Katana
This program protects your computer by disconnecting your PC from your broadband Internet connection when your mouse or keyboard has not been used for a specified amount of time. It can be reactivated using a a password, or by moving the mouse or keyboard. You can also connect and disconnect manually and set timed Internet session limits with SessionLock and use our PassLock password protection feature to completely control all access to the Internet. Topics: Broadband Lock Internet Security, Internet, Security, System locking, Broadband Lock Internet...
This program instantly blocks unknown programs from using your CPU, unless you approve them. It keeps a list of programs you trust so there are no suprises. The program also controls how long programs can run, and when they can run, so you can limit your kids and co-workers from using your PC unless you approve. Topics: Spykeys CPU security system, System and utilities, Security, Trojan detection, Spykeys CPU security...
This suite of system utilities maintains and controls computer stability while automatically protecting it against dangerous viruses and Trojans. This latest update to the suite can operate as an automatic protection tool overlaying all of the basic system functions. It's simple to install and use, yet it provides the flexibility to cater to individual user needs. This was designed to be compatible with the Microsoft System Configuration Utility and enhances all its features. It monitors all... Topics: RegRun Security Suite Gold, System and utilities, Security, Trojan detection, RegRun Security Suite...
This program stores passwords using modern secure cryptographic methods and generates passwords using random or pseudo-random options. It allows multiple accounts, data backup and expired password tracking. It provides multiple categories for storing data in a hierarchical manner, print and export functions, and support for Windows clipboard. It also allows you to launch other programs, Web pages and e-mails. It includes a masking option for the password engine, and data erase and recovery... Topics: Entropia Security Suite, System and utilities, Security, Password managers, Entropia Security Suite
This is an autonomous provider of log-on and resource restriction security that's integrated with Windows. It provides extremely strong, secure control of who can access a personal computer's resources and exactly what tasks they can perform. If a user's set time limit is reached, the computer shuts off and that user can not log-on again until their next permitted time range arrives. This can protect and totally control access to your personal computer. It provides administrative support for... Topics: Windows Security Officer, System and utilities, Security, User management, Windows Security Officer
This is an enhanced task manager that provides advanced information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, and CPU usage, as well as a unique security risk rating. The program also displays the start time, the icon of the process, and hidden functions. It can recognize virtual driver software, services and also BHOs or processes hidden from the Windows task manager. You can choose to... Topics: Security Task Manager, System and utilities, Security, Trojan detection, Security Task Manager
This security utility allows you to restrict access to important Windows resources. Impose a variety of access restrictions to protect your privacy. You can deny access to individual components of several Control Panel applets, including Display, Network, Passwords, Printers and System. Moreover, you can disable your boot keys, DOS programs, Registry editing and network access. Hide your desktop icons, individual drives, Start menu items and taskbar features. The "User Working Time"... Topics: 1st Security Center Pro, System and utilities, Security, User management, 1st Security Center Pro
This program locks unauthorized users out of your computer. All mouse clicks and keypresses are recorded and logged. The program also includes a virtual desktop manager, an icon protector and a screen shot maker. Topics: DesktopKeeper, Internet, Security, System locking, DesktopKeeper
This is an HTTP and SOCKS 5 proxy which can share, monitor and filter Internet access. The software makes it easy to control what users can and cannot do, and limit how much time or bandwidth is spent surfing the Internet. Your organization may provide users with Internet access, but if it isn't monitored and restricted, Internet abuse could be already costing you time and money. Restrict access by IP address or by username, define time regions when access is or isn't allowed, assign and... Topics: WebScout, Internet, Security, Parental control, FILTER, WebScout
This is a systray-driven security and safeguarding tool. It is password protected to provide a high level of security. Set this to strictly lock your desktop, specify certain files or folders that you don't want to be accessed, or hide and disable specified features in Windows. It runs hidden on your machine and lets you specify an exact lock interval. Topics: WinLock, Internet, Security, System locking, WinLock
This program can parse log files generated by SolidShare 2.5, generate report on bandwidth utilization and possible security problems using both graphical and text formation. Topics: SolidShare Analyzer, Internet, Security, Firewalls, SolidShare Analyzer
This is a firewall and virtual private network. It enables you to remotely access your computer while protecting it from hackers and worms. It will also secure your wireless network and works even with dynamic IP addresses. Note: This software is governed by the cryptographic export restrictions imposed by the United States government. Due to export restrictions, the free version of OmniVPN only supports DES. The commercial version supports 3DES, AES, and other standard encryption algorithms. Topics: OmniVPN, Internet, Security, Firewalls, FIREWALL, OmniVPN
This Internet security tool integrates four functions - Personal Firewall, Process Communication Control, E-mail Protection and Web page Content Filtration. GoldTach Pro can protect against hackers' intruding into your PC and filching personal data by e-mail. It can also prevent Trojans, worms and other malicious Web page code from damaging your software system. GoldTach Pro can block most floating and pop-up ad windows, and block cookies. Topics: GoldTach Pro, Internet, Security, Firewalls, GoldTach Pro
This parental control application allows you to set time limits for the PC and the Internet, and block or filter unwanted Internet content. You can limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when. Access is protected via password. Topics: Nanny, Internet, Security, Parental control, Nanny
This firewall helps control traffic and application launches, and protects against viruses. Bitguard Personal Firewall provides control over which applications are able to run on the computer and can prevent the launch of specific applications. It hides ports to prevent attacks and port-scans. The databases are encrypted to provide security against code attacks on the firewall configuration. Security elements cannot be stopped without administrative access. The firewall configurations can be... Topics: BitGuard Firewall, Internet, Security, Firewalls, BitGuard Firewall
This firewall for networks offers port tracking, status reports, firewall logs with the option to generate all of this into an HTML document. It offers three levels of security. Topics: Personal Firewall, Internet, Security, Firewalls, Personal Firewall
This program is used to detect adult material and inappropriate Internet activity on your computer. It locates and removes files, and checks for improper use of the Internet. It will detect images containing nudity or obscenity. Topics: Snitch, Internet, Security, Parental control, Snitch
This is a firewall solution for Windows-based servers, stand-alone PCs and LAN workstations. It provides protection against internal and external threats through secure packet-level inspection. Topics: VisNetic Firewall, Internet, Security, Firewalls, VisNetic Firewall
This program controls which Web sites can be visited and which programs can have Internet access. It also blocks e-mail messages, chat sessions and instant messages with inappropriate language. It blocks advertisements and restricts Internet time to a pre-determined schedule. Different levels of restriction can be applied for every computer user. The program sends notification e-mails with full descriptions of blocked operations and a screen-shot of the remote computer. Topics: iProtectYou, Internet, Security, Parental control, iProtectYou
This program limits, protects and monitors what users do on your computer. You can place time limits on programs or stop programs from ever running. Block Web sites and other Web material. You can also monitor Web sites, applications, chat rooms and e-mail. Topics: WatchDog, Internet, Security, Parental control, WatchDog
This program lets you spoof your MAC address and set the one you'd like. You can set a random address or start by known OIDs provided by an internal database. This works on wireless interfaces too. Topics: Mac MakeUp, Internet, Security, Firewalls, Mac MakeUp
This will protect you against external attacks, including trojans and hackers. Set the program to run on startup and you will see a status indicator icon in the systray. You can then open the program window from there to change configuration options. Topics: MindSoft Firewall, Internet, Security, Firewalls, MindSoft Firewall
This program uses pre-defined network traffic to send packets between two network cards. Where necessary, the network traffic will contain a valid two-way conversation between two devices. All information designated as the source is transmitted from the primary network card and targeted at the secondary network card. The secondary network card then listens for the inbound packet and responds accordingly. The program enables full spoofing of the source and destination IP addresses, as well as... Topics: Firewall Informer, Internet, Security, Firewalls, Firewall Informer
Surf the Web without leaving any tracks of where you have been. The program preserves all your existing browser records, while still letting you surf the Web without leaving tracks when you need to. Turn it on, and you are protected, but with all of your earlier browser records left intact. Turn it off, your browser goes back to storing records normally. An additional feature lets you optionally erase all your Web records if so choose. Topics: FreeToGo, Internet, Security, Anonymous surfing, FreeToGo
This program provides digital rights management, file encryption, digital signatures and secure file deletion. It protects your e-mail and file attachments from unauthorized forwarding, copying, printing and screen capture. Set your e-mails and documents to securely delete from your recipient's PC at a specific time and date. Topics: Essential Security Suite, System and utilities, File tools, File encryption, Essential Security...
This is a computer tracking and theft recovery program. Each time an Internet connected computer is booted up, it will send a stealth e-mail message containing its exact location to an address preset by the monitoring user. It will also post a second message on the PAL PC Tracker servers. In the event that the computer is stolen the PC Tracker support team will provide full tracking and recovery support after a report has been filed with the local police. Topics: PAL PC Tracker Lite, Internet, Security, Security applications, PAL PC Tracker Lite
This program restores Internet Explorer's default settings, and prevents Web sites from running malicious code or changing your browser settings. Options allow you to repair default home page settings, guard the start page, remove context menu items and remove toolbar buttons. The program also permanently deletes cookies, cache files, the browser history, the typed URL history and Windows temp files. Topics: IE Protector And Tracks Eraser, Internet, Security, Security applications, IE Protector And Tracks...
This is a small security program which allows you to hide information that would otherwise be in plain view. Whether you are hiding windows with the push of a button or hiding the desktop and taskbar, this program may come in handy. Also, there is an option to hard lock your computer with password protection so when you're away, your work will not be seen. Topics: Quick Hide Windows, Internet, Security, System locking, hide, windows, application, security,...
This application is designed to battle worms that target your computer by way of IRC networks. Topics: DiamondCS IRClean, Internet, Security, Security applications, DiamondCS IRClean, DiamondCS IRC Clean